Which of the following is a portable, personal computer designed to fit on your lap?

A. handtop
B. desktop
C. PDA
D. notebook


Answer: D

Computer Science & Information Technology

You might also like to view...

The enumeration FileAccess is used to ________.

a) control future users’ access to a file a) control future users’ access to a file b) control program access to a file c) control the amount of updating that can be done on a file at once d) FileAccess is a method, not an enumeration. c) control the amount of updating that can be done on a file at once d) FileAccess is a method, not an enumeration.

Computer Science & Information Technology

____________________ are machines that have been unobtrusively "owned" by a hacker.?

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

The nine points inside the Transform Each dialog box are ____________________ points.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

A new document created from a mail merge, contains data from the data source but does not contain any ________

Fill in the blank(s) with correct word

Computer Science & Information Technology